Escolar Documentos
Profissional Documentos
Cultura Documentos
N/A
14. ABSTRACT
The use of bees in warfare predates 400 BC. The unique characteristics of the honey bee are currently being exploited in three ways which may
advance military capabilities in the future. First, using the Free Flight Method ofLandmine Detection, trained bees are released near a suspected
minefield and within minutes they detect and co11gregate over landmines. Secondly, inside Contained Detection Devices trained bees extend their
straw like tongues, called proboscises, when they encounter the odors of explosives. The bees' reaction, known as the Proboscis Extension Reflex
(PER), is captured by pattern-recognition software, it statistically translates the bees' behaviors into an electronic response which then alerts the
operator. Thirdly, in the Hybrid Insect Micro-Electro-Mechanical Systems (ID-MEMS) project, researchers are attempting to develop technology to
create cybernetic organisms, cyborgs, out of bees and other insects. The objective is to control the cyborgs' flight and motions by remote control.
Used individually or in swarms, cyborgs could potentially conduct reconnaissance missions, deliver toxins, collect intelligence, track targets, and
retrieve samples, all while blending in with the environment
15. SUBJECT TERMS
16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF 18. NUMBER 19a. NAME OF RESPONSIBLE PERSON
a. REPORT b. ABSTRACT c. THIS PAGE ABSTRACT OF Marine Corps University/Command and Staff
PAGES
Unclassified Unclassified · Unclassified uu 37
19b. TELEPHONE NUMBER (/nr;lude area code)
(703) 784-3330 (Admin Office)
Standard Form 298 (Rev. 8/98)
Prescribed by ANSI Std. Z39.18
Adobe Professional 7.0
United States Marine Co1ps
·- -- ·ana
sta.ff college
~--------·-·camn2-ana
BY
ASSISTANT SPECIAL AGENT IN CHARGE LOIS DELANEY
DRUG ENFORCEMENT ADMINISTRATION
Approved: ---=~'1-6.....=:::,....-==-------,-----------
Date:----~-----~~~~~
DISCLAIMER
THE OPINIONS AND CONCLUSIONS EXPRESSED HEREIN ARE THOSE OF THE
INDIVIDUAL STUDENT AUTHOR AND DO NOT NECESSARILY REPRESENT THE
VIEWS OF EITHER THE MARINE CORPS COMMAND AND STAFF COLLEGE OR ANY
OTHER GOVERNMENTAL AGENCY. REFERENCES TO THIS STUDY SHOULD
INCLUDE THE FOREGOING STATEMENT.
Thesis: Historical uses of apiculture in warfare are largely primitive; however, the unique
characteristics of the honey bee may advance military capabilities in the future.
Discussion: Historical uses of bees in warfare predates 400 BC, when Aeneas Tacticus, alca
Aineias the Tactician, author on the art of war, wrote How to Sw1Jive under Siege, which
discusses deployment ofbees in defense of a fortified position. 11rroughout the globe, across the
sea, and in the American Civil War, the World Wars, and the Vietnam War, honey bees have
been unwitting participants.
Free Flight Method ofLandmine Detection- Landmines continue to be a threat to the military
and civilians. Traditional mine detection is slow and dangerous. Recently, scientists have
exploited the honey bees' exceptional sense of smell, and through Pavlovian conditioning have
trained bees to detect the scent of various explosive materials. Conditioned bees can be released
near a s11spected minefield and within minutes they detect and congregate over landmines.
Contained Detection Devices --Proboscis Extension Reflex (PER)- Researchers keyed on the
bee's natUral instinct of extending its straw like tongue, a proboscis, when it encounters odors it
associates with food. Bees trained to associate the scent of explosives with food, exhibit the
Proboscis Extension Reflex (PER). The bees aie being placed in portable detection units;
pattern-recognition software statistically translates the bees' PER behaviors into an electronic
response which is then displayed on a Personal Data Assistant (PDA). The unit has accurately
detected explosives on persons, in places and things.
Conclusion: The free flight method oflandmine detection is a promising teclmique which will
likely be utilized on a global scale for hrnnanitmian demining. Contained Detection Devices
(PER) units need to be implemented in prolonged actual real life conditions before its military
operability cm1 be detennined. The HI-MEMS project is still under development; therefore, its
actual viability is unlmown. Historically, cunently m1cl fuhnistically, military applications of
apiculture m·e relevant.
ii
Preface
In 2007, I became aware of Colony Collapse Disorder (CCD), a global phenomenon in which
honey bees are disappearing in record quantities. Honey bees are pollinators of 80 percent of our
agricultural products; CCD is having a negative impact on pollination and food production. TI1e
emerging crisis motivated me to become a beekeeper in an effort to help repopulate the honey
.bee.
An unintentional by-product of maintaining several hives was plentiful honey, which led to my
high school aged daughter establishing a nonprofit honey company, Bee Blessed Honey. In
partnership with a community recycling group the honey is bottled in recycled glass jars. Raw,
unpasteurized wildflower honey, such as ours, contains pollens derived from the local flora and
is proven to naturally build the consumer's immunity against seasonal allergies. The medicinal
benefits have secured customers preordenng the entire amount of honey produced every season
and all profits are donated to charity.
The study of apiculture has been rewarding and ha:s led me to delve.,into many other related
topics. Early on iri my beekeeping literature I had read a reference to Romanp' soldiers
catapulting hives, later when enrolled in the Command and Staff College, I became interested in
researching historical and current military applications of honey bees.
iii
Table of Contents
Page
INTRODUCTION ............................................................................................ 1
CONCLUSION .............................................................................................. 21
PHOTOGRAPHS........................................................................................... 23
ENDNOTES ................................................................................................. 25
BIBLIOGRAPHY................................................................................................................... 29
iv
This paper will briefly discuss the association between war and insects; it will then examine past
and futuristic military applications of apiculture. The Defense Advanced Research Agency
(DARPA), has sponsored honey b~e research in the areas of Free Flight Landmine Detection,
Contained Detection Devices based on Proboscis Extension Reflex (PER), and Hybrid Insect
can be exploited to advance demining, security, and other military capabilities in the future.
War and insects have always maintained a clandestine relationship. The most direct linkage has
been through insect-borne diseases such as typhus, transmitted through the bite of lice and ticks;
bubonic plague, contracted through lice and fleas; and malaria and yellow fever, transmitted by
infected mosquitoes. During war, overcrowding, mixing of populations, limited medical care,
decreased hygiene, and malnutrition are common; these factors make soldiers more susceptible
to disease and facilitate epidemics. 1 Spontaneous insect-borne epidemics have greatly influenced
or even determined the outcome of wars. Napoleon Bonaparte's Grande Armee suffered high
causalities;~however, for each soldier killed in battle four others died from disease? Of the
J
causalities in the American Civil War, two-thirds were caused by disease. In both cases, the
Aside from the natural spread of disease by insects, there are three ways insects have been
weaponized. Insects have been used to deliberately transmit pathogenic microbes in order to
spread disease among the enemy, to introduce agricultural pests intended to destroy livestock and
crops, and to perform direct attacks on humans to infect injury or fear. 4 The conscription of .
insects has been a documented practice for centuries. Deployed hornets defeated enemies in the
. Old Testament, according to EXODUS 23:28 "I will send the hornet ahead of you to drive the
1
Hivites, Canaanites and Hittites out of your way," DEUTERONOMY 7:20 "Moreover, the
LORD your God will send the hornet among them until even the surv.ivors who hide from you
have perished," and JOSHUA 24:12 "I sent the hornet ahead of you, which drove them out
before you--also the two Amorite kings. You did not do it with your own sword and bow." 5
For insect missions aimed at inflicting injury or fear and which may require pursuit, flying
venomous bugs which can be deployed in mass, such as hornets, wasps and bees, are well suited.
Among these, the bee, and specifically Apis Mellifera - the honey bee, is evidently the favored
winged warrior. Perhaps the bond of over 5000 years of beekeeping has helped to make man
and honey bee trusted allies. The practice of apiculture, the harvesting of honey and bee's wax,
medieval castles, forts, and homes included recesses on the outer walls, called bee boles or bee
niches, where bee hives were kept. Not only did the recesses protect the hives from foul
weather, the bees were readily accessible, and the hives could be pushed off the ledge by
reaching through a passage hole on the inside of the wall. The falling hives hampered enemies
who were attempting to penetrate or scale the structure. 6 The Romans believed that bees
provided omens which foretold the outcome of military conflicts, a sighting of a swarm signaled
misfortune. 7 Experts in bee management, the Romans made panoptic use of bees in warfare.
Romans routinely catapulted beehives over the walls of garrisons or fired the hives directly into
enemy forces; the practice was so widespread that it is believed to have endangered the number
8
of hives towards the end of the Roman Empire. In some cases, even the. bee's honey was used a
weapon. While fighting in Asia Minor against the Heptakometes, Roman soldiers led by
Pompeii the Great, consumed jars of honey they bad discovered along a mountain path. The
9
soldiers became seriously ill and "were afflicted as if they had all gone mad." The
2
Heptakometes then emerged, attacked and defeated the soldiers. The Heptakometes had set the
~-····--·------------------
honey out as bait because they knew that the honey was derived from the nectar of the local
Rhododendron plants, a substance safe for bees but poisonous to humans. Understandably, when
the Romans later conquered the' region, they refused to accept honey as payment for the war
tax. 10 In 946, the SlavicS t. Olga, the first saint of the Russian Orthodox Church and a ruler of
Kiev, avenged her son's death with the use of mead, also known as honey wine. She served the
mead to 5000 of her enemies who were attending her son's funeral. Once intoxicated, they were
slain by St. Olga's allies. 11 In the 1100's, Roman Catholic monk and historian, William of
Malmesbury, reported that under the reign of King Stephen of England, army commander Robert
Fitzhubert "used to expose his prisoners, naked and rubbed with honey, to the burning heat of the
-- ··------·-··-···---
12
sun, thereby exciting flies and other insects of that kind to sting them."
A sacred Mesoamerican text, the Popul Vuh, details accounts of the ancient Ma yans in
Guatemala constructing warrior manikins to make their army appear larger. The heads of the
manikins were hollowed gourds filled with bees. When the enemy attacked, the gourds
dislodged, broke and released the bees; the Mayans then gained the advantage in the ensuing
13
chaos. The Mayans also molded hollow clay spheres with a small entrance hole· in each. The
spheres were placed near bee colonies which soon took up residence. Before battle, the spheres'
entrances would be plugged with grass which effectively trapped the bees inside, but permitted
oxygen flow. During battle, the "bee grenades" would be lobbed into the ranks of the enemy,
14
shatter, and release the angry bees.
In 400 BC, Aeneas Tacticus, aka Aineias the Tactician, a General of the Arcadian League and
Greek author on the art of war, wrote How to Survive under Siege, which discusses methods of
defense in a fortified position. He prescribes "besieged people to release wasps and bees into
3
tunnels being dug under their walls, in order to plague the attackers." 15 Tacticus' method
proved successful for Ethelfleda of Mercia iH 908, when rhe fortification surrounding the city of
Chester, England was attacked by Danes and Norwegians led by Hingamund (Old Norse:
Ingimundr). The Scandinavians were unable to break through the walls so they dug tunnels and
were undeterred until the inhabitants threw all the city's beehives into the burrows. 16 In 939,
Geiselbert Duke of Lorraine attacked a fortified position of King Otto I of Germany. Bee hives
were thrown at the Duke's cavalry, the horses were stung severely and panicked; it caused the
. siege to be a complete failure. 17 The citizens of Gussing in Burgenland (now Austria) repelled
Duke Albert of Austria and his army in 1289, by deploying a combination of "hot water, fire
contains a sketch of a windmill type device launching bee hives, a second sketch depicts the
_ hives descending on a fortress and its soldiers being attac.ked by bees. 19 The Kissingen Parish
Chronicle (Bavaria) reported that in 1642, Swedish soldiers led by General Reichwald attacked
the town and were forced to retreat when the defenders threw bee hives on them.Z 0
In the 18th century, a number of vi·olent conflicts between the Austri~ns and the Turks took place
in Belgrade. At one point the Turks penetrated the city walls but were stopped by a barrier of
bee hives. 21 Honey bees also served in the Navy, "As early as 332 BCE, earthen hives were
thrown onto enemy decks, and with the advent of the catapult, bees and hornets became standard
projectiles on the high seas. Across the Greco-Roman and Syro-Palestinian worlds and into the
Middle Ages, warships carried bee hives as part of their arsenals." 22 Records kept by Abbe Della
Rocca in 1790 'relay an incident in which a small privately owned war vessel was chased and
boarded by an armed Turkish galley. The crew of the smaller vessel climbed its rigging and
threw earthenware hives at the Turks. 23 In Nigeria, the Tiv people fed a portion of their bees
4
poison, allegedly causing the sting to be lethal. 24 On the battlefield the Tivs projected the
poisoned bees at their enemies through "bee cannons," created from large custom-made horns. 25
During the American Civil War, at the Battle of Antietam, brigades under Union General
William French, crossed the fields of the Roulette Farm, outside of Sharpsburg, Maryland. 26
While advancing, the rookie 132nd Pennsylvania Volunteers sought cover in the Roulette's bee
yard until a Confederate cannon ball tore through a row of hives. "The slapping, swearing
regiment was disintegrating and the Union commanders worried the panic would spread across
the enti~e front. The Pennsylvania unit was mdered to double-q~ick march p'~stthe Roulette
farm, which allowed the troops to escape the bees but left them without cover. The Confederates
A woman in Georgia used her honey bees to prevent both Union and Confederate soldiers from
plundering her farm. The woman fastened a cord to one of her hives and ran the cord through a
hole into her house. As soldiers approached, she pulled the cord, the hive fell, and angry bees
drove the soldiers away. This line of defense was successful on numerous occasions. 28
In World War I, the Germans used trip wires strung to bee hives in order to delay advancing
British troops. 29 In a separate incident, Belgian soldiers trapped in an apiary managed to escape,
in part by throwing frames of bees at the Germans. 30 During the Italian conquest of Ethiopia
(1935-6), the natives dropped bee hives from mountain heights on to Italian tanks and "the bees
31
easily entered the tanks, teirorizing the Italian drivers and causing the loss of several tanks."
Attacks by bees were also a concern for US tank soldiers in Vietnam. The book Vietnam Tracks:
Armor in Battle, 1945-1975, states "A swarm of bees descending on a tank was no trivial matter,
and several crews became seriously ill as a result of multiple stings."32 The Asian honey bee,
5
Apis Dorsata, is larger and more aggressive than domestic honey bees, and both the North and
South Vietnames~ devised booby traps to disrupt the wild hives in the jungle.33
In the past, honey bees have been used in both defensive and offensive measures. A recent
defensive application under development involves the detection of landmines. Landmines have
been widely used as weapons of war since the mid 19th century. They are easily manufactured,
inexpensive and effective. 34 Landmines serve three functions in warfare: (1) to delay forces
resulting in a loss of synchronization and loss of surprise; (2) to damage or destroy vehicles and
dismounted soldiers; and (3) to cause fear and anxiety in enemy troops. 35 Unfortunately, even
with the assistance of the United Nations and humanitarian organizations, many post conflict
----nations lack the· resources and infrasrructure-to clear their minefields and-innocent civilians-have-····-·--···-·····
become the primary victims. 36 Additionally, the presence of landmines prevents civilians from
resuming normal activities, such as farming, which in turn delays the country's post conflict
recov~ry. 37 An estimated 45-50 million mines were not yet cleared in 2001. 38 A 2003 study
conducted by the RAND Corporation, estimates 15,000- 20,000 causalities are caused by
landmines each year, of which over 30 percent of the victims are children. 39 Blast survivors
commonly suffer the loss of limbs, have shrapnel wounds and may be blinded. 40 The RAND
study suggests that at the current rate in which minefields are being cleared by government and
nongovernmental organizations, it will take between 450-500 years to clear them all, and that is
In conventional mine detection, an area is divided into grids and a deminer using a metal detector
and a prodding stick, sweeps the detector close to the ground and slowly advances forward.
When the detector sounds an alert, the deminer probes the area with the stick. If the object is
6
determined to be a mine, il is detonated using one of an array of detonation methods. This type
of mine detection is extremely dangerous and slow, it has changed little in the past 40years. The
RAND report, Alternatives for Landmine Detection, evaluated multiple emerging and innovative
mine detection technologies. RAND grouped the landmine detection systems into five major
Explosive Vapor; each system has strengths and limitations. 42 Detection of explosive vapors is
the method which identifies the location of mines by their emanating odor. This category
includes the use of trained sniffing dogs and more recently the use of trained honey bees in free
Nearly all buried landmines leak expl?sives or chemical derivatives into the ground. 44
Approximately "95 percent of the explosive will absorb to the surrounding soil, the remaining 5
percent will travel away from the mine, mostly through dissolution in water in the soil pores.
Some of this explosive will migrate to the ground surface in vapor form." 45 Thus the
concentrations of vapors present for detection are exceptionally low, requiring the sensor (i.e.
dogs or bees) to be able to perform detection at an incredibly low threshold. 46 Demining dogs
are valuable assets in locating landmines; some dogs possess a higher olfactory sensitivity than
mechanical detection instruments. 47 Demining dogs, trained to react to the odor of trinitrotoluene
(TNT) and other explosive compounds, proceed through minefields followed by their handlers.
When the dog detects an explosive scent, it sits down and the handler or another deminer
examines the area with a probe to determine if it is a mine ..Although sniffing dogs are effective,
the degree of effectiveness varies from dog to dog. A dog's training and the ability of its handler
are factors, as well as environmental conditions such as weather and terrain. 48 Utilizing
7
demining dogs is problematic in that the dog's weight can trigger landmines, multiple dogs
····--~-····~-··· ·-------------------
cannot be deployed at once, making the search process slow, and because a minefield must be
DARPA has a billion dollar a year b_udget to test innovative ideas for defense applications. 5°
DARPA began seeking researchers to develop safer, more efficient methods of locating
landmines. Aware that scientists at the University of Montana (UM) had already capitalized on
DARPA contracted. the UM to perform research to determine if the honey bees' keen sense of
For the previous thirty years, UM researchers had been utilizing honey bees to collect samples of
the environment. Honey bees are natural foragers; they forage for water, nectar, propolis, and
pollen. Honey bees are diligent workers and cover large distances; in order to create one pint of
52
honey, the bees visit approximately 5 million flowers. Additionally, bees from just one hive
often make tens of thousands of foraging flights a day ... They routinely !ravel within a two-three
mile radius, encompassing almost 6000 acres. 53 Honey bees have branched hairs all over their
bodies which create a static charge. The hairs pick up chemical and biological particles from the
chemical plants, and relied on the bees to take passive samples. When the bees returned to their
hive, the trace particles on the bees were tested, as well as the honey and the bees wax. Through
the sampling data scientist are able to evaluate the environment by testing for pollutants. The
8
method also has a military application because the environment can be assessed in the same way
~---·-·---·--· ·-·---· - - - - ·
bees to seek specific "odors of interest." 55 The bees' sense of smell, or olfactory abilities, is
extraordinary. Bees' two antennae consist of 3,000 microscopic sensory organs, which can
56
distinguish over 170 various scents in nature: Bees use their olfactory abilities to locate food,
but also as a method of communication. Be.es produce a variety of pheromones, which at:e _.1,_.
chemical scents. The release of pheromones triggers behavioral responses from other bees. The
scent c~~~ use~ ~sa navigati~J1~!-~i~; it can commu11i9ate a bee's developmental status,
supplementing the bees' food with trace amounts of explosive byproducts used in landmines. 58
The bees quickly learned to associate the scent of the explosives with food. 59 Caffeine, which
improves the bees' memory was also added to the bee food along with a unique mixture of 0 ther
60
substances (patent p·ending), which bees actually prefer over their natural food sources. After
9
just one or two days of conditioning, a colony of bees (approximately 40,000) can be released in
--------·-·--·-------------------
the area of a minefield and they will seek out the scent of the explosive compounds they were
conditioned for, while completely ignoring the flora. 61 The conditioning method requires very
little effort, is inexpensive, and can be used to train tens of thousands of bees at one time to
The University of Montana, DARPA, Sandia National Laboratories (SNL) and the Air Force
Research Laboratory (AFRL), have participatl~~d in a number of trials held at Fort Leonard V{pQd .
Army base in Missouri. Fort Leonard Wood maintains minefields and utilizes them for testing
safely on the outer perimeter of one of the minefields. Within minutes of being released, the bees
detected the landmines' vapor plumes and followed the scent of the plume several meters to its
62
source. The bees dwelled above the source and although they didn't receive a food reward,
they continued to visit the spot repeatedly. Those areas which became densely covered with bees
and where bees·exhibited longer dwelling time indicated where the explosives were buried. 63
The tests were conducted with explosive chemical concentrations so small that they are
measured in parts-per-billion (ppb) and parts-per trillion (ppt). An example of one ppb is the
equivalent of a single drop of ink in one of the largest tanker trucks used to haul gasoline; the
64
ink concentration would be 1 ppb. The concentration of one ppt is equivalent to one drop of
65
ink in a string of railroad tanker cars· ten miles long; the ink concentration would be 1 ppt.
manufacturing, is the overriding chemical found from the majority of landmines. 66 In the tests,
using 2,4 DNT in vapor concentrations at ppb and ppt, the bees' detection rate was between 97
10
67
and 99 percent. The average vapor concentration in minefields is approximately 0.01 -100
-----------------··-~·
pptr; therefore, is well within the range of detection by honey bees. 68 Additionally, scientists
"calculated a 1.0-2.5 probability of false positive, and less than a 1 percent probability of false
negative, based on three different statistical sampling strategies. Calculated receiver operating
characteristics (ROC) curves for 10 pph through 0.0001 ppb indicated that for doses higher than
0:01 ppb (10 ppt), the bee system behaves like a very fine-tuned, nearly ideal, detector." 69
The be,,.;:s' ability to detect explosive odors.at low concentration exceeds, that, of nearly all
manmade detection methods and can equal that of demining dogs. 70 The bees were able to
__ ___ correctly identify the targets over a plot_ted are~--~~!~~~--t~an o~::_~1~ur, ~l!ile a search of the sam~----
-;c·- ---
advantages of utilizing bees rather than dogs: 1) bees weigh one-tenth of a gram so they won't
trigger mines; 2) bees do not require a handler to enter the minefield; 3) bees can be trained and
deployed within a day; 4) bees operate autonomously and search areas repeatedly; 6) once
deployed the bees need no guidance and they independently return to the hive at dusk; 7) bees
from local beekeepers across the globe can be used, and 7) overall costs are far lower than dog
72
teams.
There are limitations to utilizing bees for the detection of mines; bees do not fly at night, during
beavyrain or strong winds, and they remain in the hive when temperatures are below 40 degrees
73
Fahrenheit. These limitations are almost inconsequential given mine detection is not a
nighttime activity and detection based on vapors will be severely hampered in rain or winds in
and of itself.
11
-···----~·-····--·----
·--~---------------------------
A major obstacle to deploying bees over large areas to locate landmines is the ability to track and
plot the bees effectively. 74 Bees can easily fly upward of2 Y2 miles from the hive in a single
foraging trip; therefore, visual observations and use of cameras or video are only feasible at
short-range. 75 Initial, and since abandoned tracking techniques included dusting the bees with a
reflective florescent powder and fittin'g the bees with miniature radio frequency tags. 76 At the
Fort Leonard Wood trials tracking became far more proficient with the use of Light Detection
and Ranging (LIDAR) technoLogy .. In coordination with the. National Oce.anic. and. Atmosphe..r_ic ·,·:
Administration (NOAA), a LIDAR system which was developed and utilized for tracking fish
LIDAR is similar to radar which uses radio waves, and to sonar which uses sound waves.
LIDAR emits a pulsed laser light in conjunction with a photomultiplier. The unit scans back and
forth, horizontally over a specified area. 78 As it strikes the bees, the light is reflected back and
the return signal indicates the location of the bees. 79 Essentially, "Individual bees are located by
synchronizing the detection of scattered light with the timing emitted laser pulses and the
position of the beam." 80 With the generated data, the location and dwell time of the bees was
mapped and showed an accurate depiction of the placement of the mines. 81 Interestingly, in the
same trial, the LIDAR also detected bee congregation in an area outside the mine area, in what
was believed to be a mine free control area. Throughout the three day trial, a numbero:f the bees
gathered on the exact same spot in the control area. A sample was taken of the pinpointed soil
and was determined to contain TNT and DNT. The bees had located an explosive contaminate
82
in the control area which no one had been aware of previously. The LIDAR systen1 is
12
undergoing refinement and modifications to make it more light-weight and field-portable. 83
Although further sophistication in LIDAR is being sought by researchers, the simplicity of the
bee detection system still allows beekeepers across the globe to rapidly and inexpensively use the
soils and sugar water to train his bees, along with a ladder and binoculars to observe the bees in a
The use of bees for mine detection is most beneficial-in area reducti0n,which is the process
which reduces the size of an initial area thought to be contaminated with mines to a smaller area .
. .-Area reduction frees_ up land so that it can be repopulated, serve_a,s_ transPQrtatiQ_I'!JOU!~·s,b_~_~seg _ _ _,________. .
for farming or other post war recovery purposes. During war, bee colonies can be disturbed or
destroyed; therefore, establishment of additional bee hives also assists in the recovery process
because bees are essential for pollinating many crops. 85 It is unlikely that bees will r~place the
use of dogs in mine detection; however, bees can be used in combination with the effort? of
demining dogs and other methods, decreasing the time and costs of demining. 86
After determining honey bees could be trained to detect explosive chemicals, researchers began
seel{ing military applications in addition to the free flight method used for landmirie detection.
With sponsorship from DARPA, the Los Alamos National Laboratory (LANL), in New Mexico,
initiated the Stealthy Insect Senor Project, as a collaborative effort of its Bioscience; Chemistry
and Environmental Protection Divisions. 87 In this instance, researchers keyed on the bee's
natural instinct of extending its straw like tongue, a proboscis, when the bee encounters odors it
13
associates with food. Again usi_n&£~~~?-~~~~- conditioning techniques, the bees were exposed to
puffs of air which contained vapors from explosives and immediately afterward were then given
a reward of sugar water. As the bees became conditioned, they exhibited the Proboscis
88
Extension Reflex (PER) when they detected the chemicals in the air.
. Since bees only use their proboscis for feeding, the PER indicates a positive detection response
for substances it associates with food. LANL researchers developed a shoebox sized prototype
unit, called a sniffer box, in which tlu·ee restrained bees were placed. A camera inside the box
was focused on the heads of the bees and the image was transmitted to a laptop computer. 89
When activated, the unit obtained air samples from the exterior, pulled it into the box and blew it
over the bees. The bees showed no reaction when exposed to uncontaminated air samples and
90
exhibited PER when exposed to air samples containing trace explosive vapors. In 2005,
Command, and the US Marines. 91 The researchers constructed three test settings designed to
simulate real life explosive detec,tion scenarios. In a curbside explosive scenario, the sniffer unit
was exposed to an uncontaminated crate and a crate containing TNT. For a ten-orist scenario,
14.
two individuals were checked by the sniffer unit, one individual wore a vest containing C4 and
·····---··-·-··-·· -------------------
the other did not. During a checkpoint scenario, an empty vehicle and a vehicle loaded with
both C4 and TNT were subjected to the sniffer unit. The guest representatives along with the
researchers were able to observe the bees' images on the laptop computer and in each scenario;
the bees correctly identified the objects containing explosives by exhibiting the PER. 92
A United Kingdom (UK) based biotechnology company, Inscentinel Ltd., improved upon
· · ··LANL's· prototype sniffer box:93 -When air samples were drmy,ninto LANUs.sniffer box, a
human operator was required to observe the bees' image on a computer screen, determine if all
qr some ofthe bees were_e'll:hil?iting the PER, and make a con~l1Jsionjf_the bees' behavior w~s a
positive or a negative response. 94 In the more advanced Inscentinel's detection unit the VASOR
136, which uses Volatile Analysis by Specific Olfactory Recognition (VAS OR), the need for
human observation and interpretation are eliminated. A camera inside the VAS OR 136 is linked
to movement and pattern-recognition software which statistically translates the bees' behaviors
into an electronic response and is then displayed on a Personal Data Assistant (PDA) screen. 95 A
single dysfunctional bee. will not cause the software to trigger a false alarm. 96
The VAS OR 136 detection unit is a hand held device that resembles an automobile vacuum. In
order to load and operate the unit, conditioned bees are first subjected to cooler temperatures
which do not harm the bees but slows down their movements for ease of handling. Thirty-six
(36) bees are then placed into humane, reusable bee harnesses; once secured, they are allowed
time to acclimate. The harnesses are then snapped into six (6) cassettes and loaded into the
unit. 97 Inside the unit, a clean filtered airstream is continuously passed over the bees until the
15
operator activates a button which draws in an unfiltered sample of air from the immedia'te area.
Air samples containing even trace vapors of a substance the bees are conditioned for, will cause
the bees to PER. The responses of all 36 bees are immediately interpreted by the software and a
result is displayed on the PDA screen which can be read by any operator. 98 The PDA displays
red for a positive result, meaning the bees detected the targeted substance; a green display
indicates a negative result. 99 The bees are resilient and diligent; they can easily perform a
....
·.;
In addition to DNT, TNT and C4, bees can be trained to exhibit PER when they detect a wide
-----~r!~X~f explosives co~po_~~9_s._ Bees can det_~~~ Ho~~~~~r_e~9J:J~l!ant grains which can be used, ....
·····~-·~·-~·~~;,; ···---------
in Improvised Explosive Devices (IEDs). 101 They can also detect Semtex, PE4, DMNB,
gunpowder, and hydrogen peroxide which is sometimes an ingredient of homemade bombs. 102
Triacetone triperoxide (TATP), an explosive used by Richard Reid, the shoe bomber, is often
difficult for dogs to detect but not for bees. 103 The design of the VASOR 136 is more versatile
than most electronic units. The majority of electronic sensing units are either narrowly specific
to a single compound or to just a few compounds. The VASOR 136 contains 36 bees, each
105
desires to screen for, the bees could be trained differently for those tasks. It allows for "all
36 bees can be trained to a single target odour to produce maximum confirmation of a detected
target substance. Alternatively, bees can be trained in small groups to detect multiple target
statistical group of bees." 106 In cases in which an enemy attempts to circumvent detection by
substituting a previously unusedcompound, bees can be retrained to detect the new compound
16
107
and be ready for redeployment in less than a day. The cost of retraining bees is minimal, but
----··---·~---------
it would take 4-6 months and cost roughly $38,000 to train a dog to detect an alternate
108
compound. In an environment where counter detection measures are continually evolving,
sensor technology can be outpaced and the adaptability of the bee becomes more valuable.
Inscentinel Ltd., is currently developing a detection unit which will house seventy-eight (78)
bees and be capable of detecting twelve (12) different chemicals at once. 109
The VASOR 136 has been independently tested OLttside of laboratory settings. In 2004, the L)S
military funded and performed a test of InScentinel 's bee sensor technology in order to evaluate
its effectiveness in detecting car bombs. At a military facility inArizona, local honey bees were
--- ---··-- .,.. -------------
trained, placed in Inscentinel sensing instruments, and were proven able to successfully detect
110
car bombs from a string of vehicles. In an independent test conducted by the UK Office for
Security and Counter Terrorism (OSCT), the Inscentinel VASOR 136 was evaluated against an
electronic detector, the Smith's Detection Sabre4000, in airport checkpoint scenarios. During
the trial, the Inscentinel VASOR 136 was abJe to detect explosives in concentrations in the ppb
111
range. Detection units such as the Inscentinel V ASOR 136, can be used for defense and
security to detect roadside bombs, persons wearing explosives, persons having handled
explosives, car bombs and explosive packages. The detection unit can be used as a portable
device, remain static as persons or objects are passed by it, or it can be loaded on robotic
In order to survive in the wild, bees are very skilled at isolating the scent of specific t1owers
which are preferred food sources. Bees can detect and follow a single preferred scent through a
17
bouquet to other scents. 112 Through the sugar reward training, bees prioritize the scent they are
~ ··-
conditioned for above others. Researchers found the bees to be incredibly diligent in their duties,
despite attempts to distract them by masking the targeted scent with lotions, oils and even
insectiddes; the bees still performed the PER when presented with the conditioned scent. 113
Reinforcing the bees' training is as simple as exposing the bees to a "boost" of the targeted scent
Researchers have found that the ability to learn and to detect scents do differ in individual
bees. 115 : Some bees have keener olfaction characteristics and researchers are exploring genetic
and physiological differences between bees. Studies are also being conducted on bees' antennae,
... - - = - - - - - - - - - -
biochemical and molecular mechanisms have been discovered which may lead to a better
understanding of bees' differing learning and retention abilities. 116 Ideally, a superior bee could
Honey bees can be trained to target almost any odor; so there are many other application
possibilities. "In 2010, bee training in the fields of defense and security, medicine, food, and
building industries is big business. Bee training is essentially the same as it was in 1999, but the
results are attained with more sophisticated and less expensive technology." 117 Bees have
already been trained to detect illicit narcotics, and could be taught to seek cadavers. 118 . Simply
by being exposed to a patient's breath, bees can detect the scent of certain diseases and
hormones; bees are "being used as early detectors of lung and skin cancers, diabetes and TB, as
well as to monitor fertility cycles and confirm pregnancies." 119 Detection of rapidly spreading
bacteria such as ~scherichia coli and salmonella in foods are also being tested. 120
18
------------------· -----------~------- ----------
Since 2007, DARPA has been utilizing bees in an innovative defense project entitled Hybrid
122
to develop technology to create cybernetic organisms, cyborgs, out of bees and other insects.
DARPA has provided funding to a number of universities and businesses, including the
of Michigan, and the Boyce Thompson Institute, to perform fundamental research and embed
micro-electro-mechanical systems (MEMS) chips into developing insects' pupae during the
in the later stages of metamorphosis, the renewed tissue growth around the MEMS will tend to
'
heal, and form a reliable and stable tissue-machine interface." 124 The objective is to control the
cyborgs', or fondly called cybugs', flight and motions by remote control, using Global
Positioning Systems (GPS), Radio Frequencies (RF), optical or ultrasonic signals. 125 Once
remote control is accomplished, the cyborgs would be outfitted with one or multiple sensors,
such as a microphone, video camera or gas sensor and would have tbe capability to stream the
126
collected data. The design of the MEMS chip seeks to "harvest enough energy from the
127
insects' movements to power its wireless transceiver, sensors and probes." Plans also include
integrating very small fluidic devices to carry chemicals that could be delivered through the
128
cyborgs' sting. Ultimately, DARPA hopes to 11 hack into the insects' own natural senses,
allowing the remote-control operatot to look out of the insects own eyes, instead of attaching a
video camera for it to carry." 129 Used individually or in swarms, cyborgs could potentially
19
conduct reconnaissance missions, deliver toxins, collect intelligence, track targets, and retrieve
---- --·-·~·-----·-~----··--------
DARPA spokespersons have confirmed that 11 this technology is being developed with defensive,
offensive and national security strategies in mind. 11131 The DARPA HI-MEMS website contends
11
We have used horses and elephants for locomotion in wars 11 and 11 more recently, olfactory
training of bees has been used to locate mines and weapons of mass destruction; 11 therefore, the
as saddles and horseshoes are needed for horses locomotion control." 132 DARPA asserts the
"derived technologies will enable many robotic capabilities at low cost, impacting the
development of future autonomous defense systems. The realization of cyborgs with most of the
machine components inside the insect body will provide stealthy robots that use muscLe actuators
which have been developed over millions of years. 11133 DARPA's enthusiasm is not universally
shared; certainly there are ethical and legal implications of creating living robots for military and
security purposes, especially if the cyborgs are weaponized with biological agents or other
toxins. Concerns about the potential domestic use of the cyborgs for surveillance purposes have
already been raised by the Electronic Frontier Foundation (EFF), a digital rights and civil
liberties group. EEF Spokesman Peter Eckersley said '1Anyone who is just a little bit creative
DARPA's primary interest is in creating cyborgs from flying insects; however, it also offers
5
funding for research on hopping and swimming insects.U As of2009, DARPA had invested
20
$12 million into the project. 136 The HI-MEMs project is to be developed through three phases:
-------~-----··--······~
the first phase is to create bio-electro-mechanical interfaces to the insects, the second phase is to
control the locomotion using MEMS platforms, and the third phase is to scavenge power from
the insects. 137 "To be considered successful, the final};II-MEMS cybernetic bug must fly 100
meters from a starting point and then be steered into a controlled landing within 5 meters of a
specified end point. On landing, the insect must stay in place." 138 Despite many skeptics, the
project is reported to be "progressing at a rapid pace. "139 Phase one has been accomplished,
"DARPA funded research groups have succeeded in inserting a MEMS Ghip into an insect's _ .
°
pupae, with the adult being hatched successfully." 14 Cornell University demonstrated it had
passed phase two in 2008, when tobacco hornworms implanted with MEMS chips developed
--~--·
into mature "moths whose muscles could be controlled with the implanted electronics. " 141 Since
2009, videos have surfaced of various other cyborg insects taking flight which include horned
CONCLUSION
The free flight method of landmine detection is highly effective and is a promising technique
which will likely be utilized on a· global scale for humanitarian de mining. However, time
constraints and conditions for bee management make it unfeasible for mine detection on the
battlefield. The PER detection units have had outstanding results in laboratory tests, in
controlled field tests,· and in independent testing; however, units need to be impleme1'1ted in
prolonged actual real life conditions before its military operability can be determined. Even if
these detections unit are never implemented on the battlefield, they can be of great value
domestically at border crossings, airports, seaports and post offices. The HI-MEMS project is
21
still under development and a large portion of the project is classified; therefore, its actual
----~-
could be fully weaponized and a single cyborg swarm could be used to simultaneously spread
disease, destroy crops, infect food supplies, and engage in attacks on humans. The unique
characteristics of the honey bee can be exploited to advance demining, security, and other
22
bttp ://www .inseen tinel. com/In seen tinelLtd/Pages/technology .html
23
Figur.e 6: Pupal stage insertion (iJ and .s·ucces.~jf.r!
- eme:ngen·ce· (if).· The rnicros_;-•stem platform on- (ii) is held
Tvitih tlF·ee:ers to shont 1ving openirtg o.l !he moth. The .:r-Rcu:
hnage r.J;,{ the dotted part (.4) sho1vs the probes fnserted into
the t:iorsoventrcd ant! dm~solcmgitudinal jlight musdes. CT
_________. ___ . ___~i1r-iages rB)-sh~o1-~:,. (-:orriponents ojhigfi .cr1i.'io1-:ban(~-e In~lrcaifng -~-
tissue· gri;lvfh around the probe,
24
Endnotes--···------------------~-~
1
Robert Peterson, "Insects, Disease, and Military History," American Entomologist 41, no 3 (Fall1995): 148.
2
· Jeffery Lockwood, SLY-legged Soldiers: Using Insects as Weapons of War (NY: Oxford University Press,2009), 57.
3
Lockwood, Six-Legged, 65.
4
Lockwood, Six-Legged, 5.
5
Bible New International Version (London: Hodder & Stoughton, 2008).
6
Lockwood, Six-Legged, 23.
7
John Ambrose, "Insects in Warfare," Army (Dec 1974): 33.
s Ambrose, "Insects," 34.
9
Ambrose, "Insects," 34.
10
Ambrose, "Insects," 35.
11
Conrad Berube, "War and Bees: Military Applications of Apiculture,"
http://www.imkerei.co m/ar tides/us/war bees.h tm.( accessed 10/22/20 10). .
12
Hilda Ransome,. The Sacred Bee in Ancient Times and Folklore (NY: Dover Publications, 2004), 152.
13
Lockwood, Six-Legged, 17.
14
Lockwood, Si.x.-Legged, 17.
1
' David Whitehead, Aineias the Tactician :How to Survive under Siege (Bristol: Bristol Classical Press, 2003).
·---------------:~
16
Lockwood,Six-Legged,21._ _____ _ ---····-
17
Eva Crane, The World History of Beekeeping and Honey Hunting (NY: Rutledge, 1999), 540.
18
Crane, History, 541.
19
Crane, History, 541.
20
Holley Bishop, Robbing Bees: A Biography of Honey, the Sweet Liquid Gold that Seduced the World (NY; Free
Press 2005), 157.
21
Lockwood, Six-Legged, 21.
22
Lockwood, Six-Legged, 24.
23
Crane, History, 542.
24
Crane, History, 544.
25
Lockwood, Six-Legged, 17.
26
Howard Blair, Civil War, 77.
27
Lockwood, Six-Legged, 74.
28
Lockwood, SLY-Legged, 74.
29
Ambrose, "Insects," 37.
30
· G.M.Stair, "Bees in Wartime," http://www.sustainable-gardening-tips.com/Bees-in-Wal:time.html (accessed
11/20/2010).
ll Ambrose, "Insects," 37.
32
Simon Dunstan, Vietnam Tracks: Armor in Battle, 1945-1975, (CA: Osprey Publications, 1982 ), 113.
33
Ambrose, "Insects," 37.
34
U.S. Department of Defense. Humanitarian Demining: Developmental Technologies 1998,(Wasllington, DC:
Government Printing Office, 1998)
35
U.S. Department of Defense. Defense Threat Reduction Agency. Developing Science and Technologies List-
Section 17: Sensors Technology. (Ft. Belvoir, VA: US Government Printing Office, 2000),
http://www .d lie. mil/mctl/DSTL!DSTLSec17 g. pelf (accessed 12/01/201 0), 17-42.
36 DoD, Demining, 1.
J? DoD, Demining, 1.
JR Jacqueline MacDonald, and J. R. Lockwood, Alternatives for Landmine Detection (Santa Monica, CA: RAND,
2003), 2.
39
MacDonald, Alternatives, xv.
40
MacDonald, Alternatives, 2.
41
MacDonald, Alternatives, xv.
42
MacDonald, Alternatives, xviii -xx.
25
~~.-·-··· 43 MacDonald~Alternatives;-29: -- ~--·- ····-·····-·
44
MacDonald, Alternatives, 30.
45
MacDonald, Alternatives, 30.
46
MacDonald, Alternatives, 30.
47
MacDonald, Alternatives, 33.
48
MacDonald, A lteniatives, 33.
49
MacDonald, Alternatives, 33.
50
London Evening Standard, "Sniffer Bees set to Snare Suicide Bombers," News & Current Affairs, August 23,
2010, http://www .thisislondon.co. uk/news/article-233 7 6248-sniffer-bees-set- t.o-sn are-suicicle-bo mb ers.clo (accessed
11/20/2010).
51
Jerry Bromenshenk and others, "Can Honey Bees Assist in Area Reduction and Land mine Detection?" l01mwl of
Mine Action, issue7.3, (December 2003 ), http://maic.jmu.eduijournal/7.3/focus/bromenshen.k/bromenshenk.htm
~accessed 10/22/2010).
2
Howland Blackiston, Beekeeping for Dummies (NY: Hungry Minds, 2002), 29.
53
Blackiston, Beekeeping, 29.
54
Cary Shimek, "Harnessing the Honeybee," Research View- University of Montana, Spring 2004,
http://Www.umt.edli/urelations/rview/spring04/honey.litm (accessed 11/20/2010); ,, '
55
Bromenshenk, "Honey Bee," 2.
56
Reese Halter, "Bees: Man's Best Friend, Provider and Protector," The Telegraph Online, November 2, 2010,
http://www. telegrap h.co. ukJscience/8104213/Bees-mans-best -frie nd-provide1:-and -protector. html (accessed
December 23, 2010) .
57
.. ---· Blac.kiston, Beekeeping, 21-. -- · -- - -·- - - - - --------- -·--··
ss Burt Helm, "Finding Land Mines by Following a Bee," Businessweek, July 16, 2005,
http://www.businessweek.cu m/technology/content/aug2005/!c20050816 6487 tc 119.htm (accessed 11/03/201 0).
59
Helm, "Finding Mines."
60
London, "Sniffer Bees."
61
MacDonald, Alternatives, 273.
62
Bromenshenk, "Honey Bee," 2.
63
Bromenshenk, "Honey Bee," 2.
64
Zane Satterfield, "What does ppm or ppb Mean?" On Tap-National Environmental Services Center, Fall 2004,
http://www. nesc. wvu .edu/ndwc/articles/ot/fa04/q &a. pdf (accessed 12/02/2010).
65
"Recourses: Conversion Tables," Water on the Web, University of Minnesota,
http://www. wateron the web .orglresources/conversiontab les.html (accessed 11/29/201 0).
66
MacDonald, Alternatives, 30.
67
MacDonald, Alternatives, 273.
68
Jerry Bromenshenk and others, "Polarizalion Lidar Measurments of Honey Bees in Flight for Locating Land
Mines," Optics Exptess 13, 2005, http://www.opticsinfobase.org/abstract.cfm'?URI=oe-13-15-5853.
69
MacDonald, Alternatives, 273.
70
MacDonald,Altematives, 273.
71
MacDonald, Alternatives, 276.
72
Bromenshenk, "Honey Bee," 4.
73
Bromenshenk, "Honey Bee," 6.
74
MacDonald, A lte1·1~atives, 280.
75
Bromenshenk, "Honey Bee," 3.
76
Paul Stone, "Researchers Buzzing about Possible use of Bees to Detect Landmines," American Farces Press
Service, July 22, 2010, http://www.defense.gov/specials/b~('!s/beesl.html (accessed 11/20/2010).
77
Bromenshenk, "Lidar."
78
Ed Gerstner, "Lasers, Land mines and Honeybees," Nature Physics, July 4, 2005,
www.natLu·e.com/nphys/journallvaop/nprelaunch/full/nphys103.html
79
Helm, "Finding Mines."
80
Gerstner, "Lasers."
81
Bromenshenk, "Honey Bee," 5.
82
Shimek, "Harnessing," 2.
83
Bromenshenk, "Honey Bee," 3.
84
Bromenshenk, "Honey Bee," 6.
26
--- -"----·- 85 Bra mensllen~"Honef Bee;"7.___
86
Bromenshenk, "Honey Bee," 6.
87
Todd Hanson, "Bringing in the Bee Team," Los Alamos National Laboratory News Bulletin, November 11, 2006,
h tlp://www.lanl. g:ov/news/ind cx.php!fuseaclion/nb .storv/story id/94 75/n b da te/2006-11-30
88
Hanson, "Bee Team."
8
~ LANL, "Scientists Train Honeybees to Detect Explosives," Los Namos National Laboratory, 2008,
hllp://www.youtube.com/watch?v= T7dObze4kM (accessed 10/22/2010).
90
LANL, "Scientists."
91
LANL, "Scientists."
92
LANL, "Scientists."
93
Insentinel Ltd, accessed December 23, 2010, http://www.inscentinel.com/
94
LANL, "Scientists."
95
Insentinel Ltd.
96
"Day of Trained Sniffing Bees is Here," Homeland Security Newswire, August 8, 2010,
http://www .ho melandsecuritynewswire.com/clay-b·ained-sniffing-bees-here (accessed 11/23/201 0).
97
Insentinel Ltd.
98
Insentinel Ltd.
99
Features, Rex, "Sniffer Honey Bees Trained to Detect Bombs," The Telegraph, 09129/2009, sec Technology.
http://www.telegraph.co.uk/technology/picture-galleries/6243071/Sniffer-honey-bees-trained-to-detect-bombs.html
(accessed November 23, 2010). ·
100
Inscentinel Ltd., "How Honey Bees can Recognize Explosives," Inscentinel Ltd.HandsOn,
··-···~-IJttp:i/www.5min.comNideo/How-Honey-Bees-Can'-Recognize-Explosives~416309516 (accessed-December23;---- - - - - - - -
2001).
101
Reuters. "U.S. Scientists Train Bees to Sniff Out Explosives," Houston Chronicle, 11/27/2006, sec Bizarre,
h ttp://www.ch ron.com/clisp/sto rv. mpllbizarre/4363 712.h tml
102
Insentinel Ltd.
103
Susan Gaidos, "Sting Operation: Scientists use Bees and Wasps to Sniff out the Illicit and the Dangerous,"
Science News, 09/27/2008, http://www.scienccnews.org/view/feature/id/36333/litle/Sting Opc.ration%3E;
http://humansubjects.energy.gov/news/articles/09272009.21Sting0peralion ac.pclf 6 ~accessed 11/28/2010).
104
Insentinel Ltd.
105
Insentinel Ltd.
106
Insentinel Ltd.
107
Insentinel Ltd.
108
Insentinel Ltd.
109
Gaidos, "Sting."
110
Insentinel Ltd.
111
Insentinel Ltd.
112
Gaidos, "Sting." .
113
L:Jndon, "Sniffer Bees."
4
u London, "Sniffer Bees."
115
Dan Vergano, "Honeybees join the Bomb Squad," USA Today, 11/27/2006, sec Science,
http://www. usa today.com/tech/science/2006 -11-26-bees-bomb-sniffing x.h tm
116
"Los Alamos Lab Trains bees to Stick Out Tongues at Bombs,"Boingboing,09/l3/2006, .
http://boingboing.net/2006/09 /13/los alamos lab train.html
117
Ted Goodman, "New Bee Sniffing Technology can Detect many Dangerous Vapors at Once," PhysOrg.
03/28/2010, http://www.physorg.com/miwsl88894292.html (accessed 11/3/21010).
08
Vergano, "Bomb."
119
Halter, "Bees."
120
Gaidos, "Sting."
121
DARPA, accessed 11/23/2010, http://www.darpa.mil/mtn/programs/himcms/
122
Jocly Ray Bennett, "Wasps of War," International Security Network, 2009, htlp://wv<w.isn.ethz.cb/isn/Current-
Affairs[Securily-Wa tch/Detaii/'?lng=en &id=1 08509
123
DARPA
124 .DARPA:
125
DARPA.
27
-----
126
eoun-Juh nson;-"Darpa· Hate hes~p:·an- fo r-Insec:- Cyborgs to-Fly Recorrnrrissance;"E£-Times,-HJ/tl312tlfJ'7'-,- - - - - - - - -
Johnson, "Cyborgs!'
128
Johnson, "Cyborgs."
129
Johnson, "Cyborgs."
130
Johnson, "Cyborgs."
m Bennett, "Wasps."
132
DARPA
133
DARPA
14
J Johnson, "Cyborgs."
135
FedBizOpps.gov, accessed 11/03/2010,
Bennett, "Wasps."
137
FedBizOpps.gov
138
Sally Adee, "Cyborg Moth Gets a New Radio," Discove1y News, May 22, 2009,
· http ://news. discovery.com/tech/radio-controls-mo th.html? print= true.
139
Nick Turse, "Weaponizing the Pentagon's Cyborg Insects: A Futuristic Nightmare that just Might Come True,"
NickTruse,l1/03/2010, www.nicktruse.com/articles/tom cyborg.html
140
Johnson, "Cyborgs."
141
Bill Christensen, "Implants Create Insect Cyborgs," Live Science (02/04/2008),
------ ·J1!.ID:Uwww.livescience:com/straru!enews/080204-cyboJ'g-insect.html
142
Bennett, "Wasps.''
28
Bibliography
"Detecting Explosives with Honeybees." Los Alamos National Laboratory, November 27, 2006.
htt;p://www.lanl.gov/newslindex.php/fuseaction/home.story/story id/9460.
"Sniffer Honey Bees trained to detect Bombs." The Telegraph. September 29, 2009. Teclmology
\
Section. http://www.telegraph.co.uk/technology/picture-galleries/6243071/Sniffer-honey-
bees-trained-to-detect-bombs.html (accessed November 23, 201 0).
"Los Alamos lab trains Bees to stick out Tongues at Bombs." BoingBoing. September 13, 2006,
http://boingboing.neti2006/09/13/1os alamos lab_train.html (accessed November 10, 2010).
"Los Alamos Perfects Bee Explosives Detection Teams." Homeland Security Newswire.
November 30, 2006. http://homelandsecuritynewswire.com/los-alamos-perfects-bee-
explosives-detection-teams (accessed December 2, 201 0).
"Researchers Abuzz About Mine Detecting Bees." American Forces Press Service, Creatures
Feature. July 28, 1999. htt;p://www.defense.gov/specialslbees/natures.html
"Sniffer Bees set to Snare Suicide Bombers." London Evening Standard, November 29, 2006. ·
News & Current Affairs. http://www.thisislondon.co.uklnews/artiele-23376248-sniffer-bees-
set-to-snare-suicide-bombers.do (accessed November 20, 201 0).
"U.S. Scientists Train Bees to Sniff out Explosives." Houston Chronicle. November 27, 2006.
News Bizane. http://Wv.rw.cbron.com/disp/story.mp1/bizarre/4363712.html (accessed
November 3, 2010).
Adee, Sally. "Cyborg Moth gets a new Radio." Discovery News. May 22, 2009.
http://news.discovery.com/tech/radio-controls-moth.html?pii.nt=true (accessed November 3,
2010).
Ambrose, John. "Insects in Warfare." Army. (December 1974): 33.
Bishop, Holley. Robbing the Bees: A Biography ofHoney, the Sweet Liquid Gold that Seduced
the World. New York: Free Press, 2005.
Blackiston, Howland. Beekeeping for Dummies. New York, NY: Hungry Minds, 2002.
Brornenshenk, Jerry J., Colin B. Henderson, Robert A. Seccornb, Steven D. Rice, and Robert T ..
Etter. "Can Honey Bees assist in Area Reduction and Landmine Detection?" Journal of
Mine Action (Issue 7.3 ,) (December 2003), ·
http://rnaic.jmu.edu/journal/7 .3/focus/bromenshenk/brornenshenk.htm (accessed Octo her
22, 2010).
Bromenshenk, Jerry J., Colin B. Henderson, Joseph Shaw, Nathan Seldomridge, Dustin Dunkle,
Paul Nugent, and Lee Spangler. "Polarizationlidar measurrnents of Honey Bees in flight for
locating Land Mines." Optics Express 13 (2005): 5853-63,
http://www.opticsinfobase.org/abstract.cfrn?URI=oe-13-15-5853 (accessed October 22,
2010).
Christensen, Bill. "Implants create Insect Cyborgs." Live Science (February 4, 2008).
http://www.livescience.com/strangenews/080204-cyborg-insect.htrnl (accessed November 3,
2010).
Crane, Eva. "A Short History about Knowledge of Honey bees (apis) up to 1800." Bee World 85
(March 2004): 6-11, http://www.culturaapicola.corn.ar/apuntes/historia/20
corta historia apicultura hasta 1800.pdf; www.ibra.org.uk (accessed October 22, 201 0).
Crane, Eva. The World History of Beekeeping and Honey Hunting. New Y ark: Routledge,
1999.
DoD Defense Tbreat Reduction Agency. "Developing Science and Teclmologies List - section
17: Sensors Teclmology." Ft. Belvoir, VA.: US Govemment,
http://www.dtic.mil/mctl/DSTL/DSTLSec17g.p_Qf (accessed December 1, 2010).
Dunstan, Simon. Vietnam Tracks: Armor in Battle, 1945-1975. Novato, Calif.: Osprey Pub,
1982.
Gaidos, Susan. "Sting Operation: Scientists use Bees and Easps to Sniff out the Illicit and the
Dangerous. Science News, September 27, 2008.
'http://www.sciencenews. org/view/feature/id/3 63 33/title/Sting Operation%3 E;
http://humansubj ects.energy. gov/news/articles/092 72009.21 StingOperation ac.pdf 6
(accessed November 28, 2010).
Gerstner, Ed. "Lasers, Landmines and Honeybees." Nature Physics, July 4, 2005,
www.nature.com/nphys/j oumal/vaop/nprelaunch/full/nphys 103 .htn1l (accessed November
28, 2010).
Goodman, Ted. "J'Jew Bee Sniffing Teclmology can detect many Dangerous Vapors at Once."
. PhysOrg, March 28,2010, http://www.physorg.com/news188894292.html (accessed
November 3,201 0).
Halter, Reese. "Bees: Man's Best Friend, Provider and Protector." The Telegraph, November 2,
2010, Science. http://www.telegraph.co.uk/science/81 04213/Bees-mans-best-friend-
provider-and-protector.html (accessed December 23, 2010). ·
Hanson, Todd. "Bringing in the Bee Team." Los Alamos National Laboratory, November 30,
2006,http://www .lanl.gov/news/index.php/fuseaction/nb.story/story id/94 7 5/nb date/2006-
11-30 (accessed 10/22/2010).
Helm, Burt. "Finding Land Mines by Following a Bee." Businessweek, August 16, 2005.
http://www.businessweek. com/technology/content/aug2005/tc20050816 6487 tc119 .htm
(accessed 11/03/2010).
Howard, Blair. Battlefields of the Civil War: A Guide for Travelers, volume 1. Edison, N.J.:
Hunter Pub, 1998.
Inscentinel Ltd. "How Honey Bees can Recognize Explosives." Mathilde Briens, ed. Inscentinel
Ltd.HandsOn, http://www .5min. com/Video/How-Honey-Bees-Can-Recognize:..Explosives-
416309516 (accessed December 23, 2001).
Johnson, Colin. "Darpa Hatches plan for Insect Cyborgs to Fly Reconnaissance." EE Times,
October 3, 2007, http://www.eetimes.com/electronics-news/4074728/Darpa-hatches-plan-
for-insect-cyborgs-to-fly-reconnaissance (accessed 11/05/201 0).
Kellner, Mark A. "U.S. Scientists Train Bees to Sniff out Explosives." Defense News vol 21 (no
47) (December 4 2006): p22.
lpckwood, Jeffrey Alan. Six-Legged Soldiers: Using Insects as Weapons of War. New York:
Oxford University Press, 2009.
Los Alamos National Laboratory. "Scientists Train Honeybees to Detect Explosives." Los
Alamos National Laboratory, htt,p://www.youtube.com/watch?v= T7dObze4kM (accessed
October 22, 2010).
Miller, Gary L. "Historical Natural History: Insects and the Civil War." American Entomologist,
43, no. 4 (1997): 227.
Morley, Sylvanus Griswold, and Delia Goetz. Popul Vuh: The Sacred Book of the Ancient
Quiche Maya. Nonnan: University of Oklahoma Press, 1965.
Peterson, Robert K. D. "Insects, Disease, and Military History." American Entomologist 41, no.3
(Fal11995): 147.
Powell, A. J., and Wilhelmina Mary Guymer. The World ofa Beehive. London: Faber, 1979.
Ransome, Hilda M. The Sacred Bee in Ancient Times and Folklore. Mineola, N.Y.: Dover
Publications, 2004.
Satterfield, Zane. "What does ppm or ppb mean?'' On Tap-National Environmental Services
Center, Fall2004. http://www.nesc.wvu.edu/ndwc/articles/ot/fa04/g&a.pdf (accessed
12/02/2010).
Shimek, Cary. "Harnessing the Honeybee." Research View Uriiversity of Montana, Spring 2004.
wvrw .runt.edu/urelations/rview/spring04/honey.htm.
Stone, Paul. "Researchers Buzzing about Possible use of Bees to Detect Land Mines." American
Forces Press Service, August 22, 2010, htt,p://www.defense.gov/specials/bees/beesl.html
(accessed November 20, 2010).
Tacticus, Aeneas and David Whitehead . Aineias the Tactician : How to Survive under Siege.
Bristol: Bristol Classical Press, 2003.
Turse, Nick. "Weaponizing the Pentagon's Cyborg Insects: A Futuristic Nightmare that just
might come True." http://www.nickturse.com/articles/tom cyborg.html (accessed
November 3, 2010).